Analysis
-
max time kernel
52s -
max time network
55s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
24/06/2024, 15:54
Static task
static1
Behavioral task
behavioral1
Sample
doc2406.vbs
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
doc2406.vbs
Resource
win10v2004-20240508-en
General
-
Target
doc2406.vbs
-
Size
12.1MB
-
MD5
e856c9c8a1e97ce7f7967e6c8639eb8e
-
SHA1
e5c6fc9f889e45916676ac6502475d5f8300ca3f
-
SHA256
321a9b3b7928f4077d15f0ef554489eb084edd01118d455a72b9954455d7be4b
-
SHA512
fb643c70c63b671c24fa60e3bdcba063e4a4c5b86010a58e82dabe4f0519bbcd3490443779319c46b9d730a71ff40824e7d04d74846f737c2b28bee6ef621cc7
-
SSDEEP
49152:7VlLVlHVlKVldVltVltVlYVlBVlSVl2VlnVlfVleVlCVl/VlzVlMVlsVl/VlTVl3:P
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation WScript.exe -
pid Process 2144 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2144 powershell.exe 2144 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2144 powershell.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4432 wrote to memory of 3188 4432 WScript.exe 82 PID 4432 wrote to memory of 3188 4432 WScript.exe 82 PID 3188 wrote to memory of 2144 3188 cmd.exe 85 PID 3188 wrote to memory of 2144 3188 cmd.exe 85
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\doc2406.vbs"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4432 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\WindowsUpdate\GMIVK.cmd" "2⤵
- Suspicious use of WriteProcessMemory
PID:3188 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowerShell.exe -NoProfile -ExecutionPolicy Bypass -Command C:\Users\Admin\AppData\Roaming\WindowsUpdate\GEZWZ.ps13⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2144
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
274B
MD536d42b4ed3945065aa61cffe23f9b893
SHA11d93ba3c5b19c3d843733e82ecf21ca0b1071140
SHA2563c08d9d867f35aa293934c2b5c71d7d1a53350eb4c778032b0b29801af279f78
SHA512a4af739d85cd543eb01e21cddcc61987a9b11c9395a11906a345f94e0ca133dcd7357e32cb072739ea5336aa0c1127dabb72d0bedf4d31ad80a8e8049b000552
-
Filesize
75B
MD532e6d964bfd04216ec2d1ec016a90841
SHA10b40001d9331e80522128d8fa445ecac6cc87f2f
SHA256c5afbbce9ff75b172093928a37a4472458195c561a3036ef6d409882d6e5dbc3
SHA512423c8620428ab6d0465dc1113a25f916c704c28d53b57ee25ec55969be6274f81739e449138c86dfdf841d583939808b66a2e1cf8554d5288adabdcea1da563e